Domain 1: Security and Risk Management Flashcards
Confidentiality
Seeks to prevent the unauthorized disclosure of information: it keeps data secret.
Integrity
Seeks to prevent unauthorized modification of information. In other words, seeks to prevent unauthorized write access.
Availability
Ensures that information is available when needed.
Subject
An active entity on an information system.
Object
A passive data file.
Annualized Loss Expectancy
The cost of loss due to a risk over a year.
Threat
A potentially negative occurrence.
Vulnerability
A weakness in a system.
Risk
A matched threat and vulnerability.
Safeguard
A measure taken to reduce risk.
Total Cost of Ownership
The cost of a safeguard.
Return on Investment
Money saved by deploying a safeguard.
Disclosure, alteration and destruction (DAD)
Opposite of CIA.
2 types of integrity?
Data integrity and system integrity
Data integrity
Seeks to prevent unauthorized modification of information.
System integrity
Seeks to prevent unauthorized modification of a system.
Disclosure
Unauthorized release of information.
Alteration
Unauthorized modification of data.
Destruction
Making systems or data unavailable.
AAA
Authentication, Authorization and Accountability
Identity
A claim of who you are. By itself it is weak because there is no proof.
Authentication
Proving an identity claim.
Authorization
Describes the actions you can perform on a system once you have been identified and authenticated.
Accountability
Holds users responsible for their actions.
Non-repudiation
Means a user cannot deny having performed a transaction.
Non-repudiation
Combines authentication and integrity. Both of these are required before you can have this.
Least privilege
Means users should be granted the minimum amount of access required to do their jobs.
Need to know
More granular than least privilege: the user must need to know that specific piece of information before accessing it.
Examples of subjects
User or computer program.
Examples of objects
Documents, database tables, text files, executable file for a computer program, etc.
Defense-in-depth
Applies multiple safeguards (or controls) to protect an asset.
Due care
doing what a reasonable person would do.
Due diligence
The management of du care.
Due care and due diligence are often confused. Think of due diligence as a step beyond due care. Due care is informal, due diligence follows a process.
n/a
Example of due care
Expecting your staff to patch their systems.
Example of due diligence
Verifying that your staff has patched their systems.
Gross negligence
Opposite of due care.
Three major systems of law.
Civil, common, and religious.
Civil law
Type of law that is employed by many countries throughout the world.
Primary difference between civil law and common law
In civil law judicial precedents and particular case rulings do not carry the weight they do under common law.
Common law
The legal system used in the US, Canada, UK and most former British colonies.
Religious law
Religious doctrine or interpretation which servers as a source of legal understanding and statutes.
Sharia
Term used for Islamic law - uses Qur’an and Hadith as its foundation.
Customary law
Refers to those customs or practices that are so commonly accepted by a group that the custom is treated as a law.